Cisco Application Control Engine up to 4700 A5 3.0 CLI File privilege escalation : 8/27/2015 12:48:04 PM

Communicate with co-workers in real time. Used by Netflix, Dropbox & Salesforce. $0/unlimited users. Get started >>
From our sponsors
 

 

Vulnerability Advisories
Vulnerabilities of scip VulDB

Cisco Application Control Engine up to 4700 A5 3.0 CLI File privilege escalation
8/26/2015 7:00:00 PM

General

scipID: 77465
Affected: Cisco Application Control Engine up to 4700 A5 3.0
Published: 08/27/2015
Risk: problematic

Created: 08/27/2015
Entry: 67.3% complete

Summary

A vulnerability, which was classified as problematic, has been found in Cisco Application Control Engine up to 4700 A5 3.0. This issue affects an unknown function of the component CLI. The manipulation as part of a File leads to a privilege escalation vulnerability. Impacted is confidentiality, integrity, and availability.

The weakness was published 08/27/2015 as CSCur23662 as confirmed advisory (Website). The identification of this vulnerability is CVE-2015-6265. An attack has to be approached locally. Neither technical details nor an exploit are publicly available.

There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.

CVSS

Base Score: 4.1 (CVSS2#AV:L/AC:M/Au:S/C:P/I:P/A:P) [?]
Temp Score: 4.1 (CVSS2#E:ND/RL:ND/RC:C) [?]

CPE

Exploiting

Class: Privilege escalation
Local: Yes
Remote: No

Availability: No

Countermeasures

Recommended: no mitigation known
0-Day Time: 0 days since found

Timeline

08/27/2015 | Advisory disclosed
08/27/2015 | VulDB entry created
08/27/2015 | VulDB entry updated

Sources

Advisory: CSCur23662
Status: Confirmed

CVE: CVE-2015-6265 (mitre.org) (nvd.nist.org) (cvedetails.com)

 

You are receiving this email because you subscribed to this feed at feedmyinbox.com

If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions

Diberdayakan oleh Blogger.